PAN-OS - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate PAN-OS with RSA Cloud Access Service (CAS) using Relying Party.
Configure CAS
Perform these steps to configure CAS using Relying Party.
Procedure
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose RSA manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured, and click Next Step.
- Under Data Input Method, choose Enter Manually.
- Scroll down to the Service Provider section and provide the details in the following format.
- Assertion Consumer Service (ACS) URL: https://<PANOS-hostname OR IP address
- Service Provider Entity ID: Enter the same Service Provider Entity ID entered in PANOS.
- Under the Message Protection section, choose IdP signs entire SAML response.
- Scroll down to the User Identity section and select the following values:
- Identifier Type: emailAddress
- Property: mail
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Under My Relying Parties, navigate to the newly created one.
- In the Edit drop-down list, choose Metadata.
Configure PAN-OS
Perform these steps to configure PAN-OS.
Procedure
- Log in to the PAN-OS admin web interface with the PAN-OS default admin user or any other admin https://IP-address-of-PANOS.
- Navigate to Device > Server Profiles > SAML Identity Provider.
- Click Import to create the SAML Identity Provider.
- Specify the Profile Name.
- Under the Identity Provider Configuration section:
- Browse the Identity Provider Metadata file, which we exported from CAS configuration.
- Clear the Validate Identity Provider Certificate checkbox.
- Click OK.
The SAML Identity Provider is created and displays the Identity Provider and SSO Service URL details as per the metadata file. - Navigate to Device > Authentication Profile and create a profile as follows:
- Under the Authentication Profile > Authentication section, specify the name.
- In the Type drop-down list, select SAML.
- In the IdP Service Profile drop-down list, select the SAML Identity Provider in the previous steps.
- Under User Attributes in SAML Messages, specify email as Username Attribute.
- Navigate to the Advanced tab and click Add.
- Select the user from the list and click OK to complete the Authentication Profile.
- Click Commit to save the configurations on PAN-OS.
The configuration is complete.
Related Articles
No token storage device was detected. Verify that the device is attached or contact your administrator error and database … 232Number of Views Quick Setup of a Replica Instance fails the attach to the Primary Instance 750Number of Views Quick Setup Guide - FIDO 440Number of Views Change the Primary Instance IPv4 Network Settings 408Number of Views IDR SSO - Step 3: Deploy the Identity Router 562Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?